Lucene search

K
nessusThis script is Copyright (C) 2005-2021 and is owned by Tenable, Inc. or an Affiliate thereof.GENTOO_GLSA-200502-09.NASL
HistoryFeb 14, 2005 - 12:00 a.m.

GLSA-200502-09 : Python: Arbitrary code execution through SimpleXMLRPCServer

2005-02-1400:00:00
This script is Copyright (C) 2005-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
16

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.128

Percentile

95.5%

The remote host is affected by the vulnerability described in GLSA-200502-09 (Python: Arbitrary code execution through SimpleXMLRPCServer)

Graham Dumpleton discovered that XML-RPC servers making use of the     SimpleXMLRPCServer library that use the register_instance() method to     register an object without a _dispatch() method are vulnerable to a     flaw allowing to read or modify globals of the associated module.

Impact :

A remote attacker may be able to exploit the flaw in such XML-RPC     servers to execute arbitrary code on the server host with the rights of     the XML-RPC server.

Workaround :

Python users that don't make use of any SimpleXMLRPCServer-based     XML-RPC servers, or making use of servers using only the     register_function() method are not affected.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 200502-09.
#
# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike 
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(16446);
  script_version("1.17");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");

  script_cve_id("CVE-2005-0089");
  script_xref(name:"GLSA", value:"200502-09");

  script_name(english:"GLSA-200502-09 : Python: Arbitrary code execution through SimpleXMLRPCServer");
  script_summary(english:"Checks for updated package(s) in /var/db/pkg");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Gentoo host is missing one or more security-related
patches."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote host is affected by the vulnerability described in GLSA-200502-09
(Python: Arbitrary code execution through SimpleXMLRPCServer)

    Graham Dumpleton discovered that XML-RPC servers making use of the
    SimpleXMLRPCServer library that use the register_instance() method to
    register an object without a _dispatch() method are vulnerable to a
    flaw allowing to read or modify globals of the associated module.
  
Impact :

    A remote attacker may be able to exploit the flaw in such XML-RPC
    servers to execute arbitrary code on the server host with the rights of
    the XML-RPC server.
  
Workaround :

    Python users that don't make use of any SimpleXMLRPCServer-based
    XML-RPC servers, or making use of servers using only the
    register_function() method are not affected."
  );
  # http://www.python.org/security/PSF-2005-001/
  script_set_attribute(
    attribute:"see_also",
    value:"https://www.python.org/news/security/"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security.gentoo.org/glsa/200502-09"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"All Python users should upgrade to the latest version:
    # emerge --sync
    # emerge --ask --oneshot --verbose dev-lang/python"
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:python");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2005/02/08");
  script_set_attribute(attribute:"plugin_publication_date", value:"2005/02/14");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2005-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Gentoo Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("qpkg.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;

if (qpkg_check(package:"dev-lang/python", unaffected:make_list("ge 2.3.4-r1", "rge 2.3.3-r2", "rge 2.2.3-r6"), vulnerable:make_list("le 2.3.4"))) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = qpkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Python");
}
VendorProductVersionCPE
gentoolinuxpythonp-cpe:/a:gentoo:linux:python
gentoolinuxcpe:/o:gentoo:linux

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.128

Percentile

95.5%